Ch5 System Security-NetworkSecurity
Ch5 System Security-NetworkSecurity
Network Security
Network Security
• Contents:
• Internet security protocols and standards
• Kerberos:
• a computer network
authentication protocol
that verifies users'
identities and protects
their data. It's used to
secure access to
applications and services
over networks
Network Security -> Internet authentication applications
• X.509:
• Recall that a certificate links a public key with
the identity of the key’s owner, with the whole
block signed by a trusted third party.
• Typically, the third party is a certificate
authority (CA) that is trusted by the user
community
• X.509 is the most widely accepted format for
public-key certificates.
• X.509 certificates are used in most network
security applications
X.509 elements:
Network Security -> Wireless network security
Next:
• Management Issues
• Quiz 2
• Assignment 2